Across
- 5. A network of infected computers
- 7. Committing identity or financial fraud
- 9. Bullying someone online
- 11. Data exposed or stolen by attackers
- 14. When body parts used for authentication
- 18. Sell knowledge of hardware to attackers
- 19. Scam email or message
- 20. Insurance against data loss
Down
- 1. Electronic equipment no longer used
- 2. Ensures person accessing software is authentic
- 3. Something that makes us safe
- 4. Harmful software that enters a device
- 6. Program designed to copy itself
- 8. Hardware used to keep intruders out
- 10. How to open a password-protected device
- 12. Software designed to detect malware
- 13. A lock on data for protection
- 15. An individual responsible for launching cyberattacks
- 16. Where you store passwords
- 17. Malware pretending to be a program
